Cross-device free-text keystroke dynamics authentication using federated learning

被引:0
作者
Yang, Yafang [1 ]
Guo, Bin [1 ]
Liang, Yunji [1 ]
Zhao, Kaixing [1 ]
Yu, Zhiwen [1 ]
机构
[1] School of Computer Science, Northwestern Polytechnical University, 1 Dongxiang Road, Chang’an District, Shaanxi, Xi’an
基金
中国国家自然科学基金;
关键词
Cross devices; Editing features; Federated learning; Free-text keystroke dynamics;
D O I
10.1007/s00779-024-01832-6
中图分类号
学科分类号
摘要
Free-text keystroke dynamics, the unique typing patterns of an individual, have been applied for the security of mobile devices by providing the non-intrusive and continuous user authentication. Existing authentication approaches mainly concentrate on the keystroke dynamics when operating a specific device, and overlook the generality of keystroke dynamics for cross-device user authentication. To tackle this problem, in this paper, we propose an efficient federated free-text keystroke dynamics mechanism to mitigate the difference in keyboards for cross-device authentication. Specifically, we explore and analyze the keystroke features of various keyboards and extract cross-device keystroke features. To protect user privacy, their type of rhythm information must be kept locally. We utilize federated learning based on the auxiliary model to train the authentication model. Our proposed solution was evaluated on a large-scale data set with 168,000 users. The experimental results show that our proposed solution performs well with great robustness across different types of keyboards. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.
引用
收藏
页码:491 / 505
页数:14
相关论文
共 40 条
[1]  
Hintze D., Fuller M., Scholz S., Findling R.D., Muaaz M., Kapfer P., Nusser W., Mayrhofer R., Cormorant: On implementing risk-aware multi-modal biometric cross-device authentication for android, In: Proceedings of the 17Th International Conference on Advances in Mobile Computing & Multimedia, pp. 117-126, (2019)
[2]  
Yang Y., Guo B., Wang Z., Li M., Yu Z., Zhou X., Behavesense: continuous authentication for security-sensitive mobile apps using behavioral biometrics, Ad Hoc Netw, 84, pp. 9-18, (2019)
[3]  
Vijayakumar T., Verification system for handwritten signatures with modular neural networks, J Artif Intell, 4, 3, pp. 211-218, (2022)
[4]  
Liang Y., Samtani S., Guo B., Yu Z., Behavioral biometrics for continuous authentication in the internet-of-things era: an artificial intelligence perspective, IEEE Internet Things J, 7, 9, pp. 9128-9143, (2020)
[5]  
Srivastava A., Kumar A., Enhancement of authentication in the IoT network, J Algeb Statist, 13, 3, pp. 2328-2336, (2022)
[6]  
Stanciu V.-D., Spolaor R., Conti M., Giuffrida C., On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks, Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, pp. 105-112, (2016)
[7]  
Miiri E.M., Using Behavioral Profiling through Keystrokes Dynamics and Location Verification Authentication as a Method of Securing Mobile Banking Transactions, (2021)
[8]  
Alfalahi H., Khandoker A.H., Chowdhury N., Iakovakis D., Dias S.B., Chaudhuri K.R., Hadjileontiadis L.J., Diagnostic accuracy of keystroke dynamics as digital biomarkers for fine motor decline in neuropsychiatric disorders: a systematic review and meta-analysis, Sci Rep, 12, 1, (2022)
[9]  
Kim J., Kang P., Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features, Pattern Recogn, 108, (2020)
[10]  
Altwaijry N., Keystroke dynamics analysis for user authentication using a deep learning approach, International Journal of Computer Science and Network Security, 20, 12, pp. 209-216, (2020)